Virtually all organisations issue staff with Mobile devices. It makes sense to provide staff with remote access to email and corporate data. However it does mean that corporate data is now outside of the protective perimeter and users are able to operate without supervision.
It is critical that these devices are secure, ensuring the users cannot put company data at risk and equally if the device is stolen that corporate data cannot be accessed or abused.
CNS will conduct a review of the device from both an authenticated (as if they are the user) and from an unauthenticated point of view (as in someone who has stolen the device). In addition if any mobile management servers (BES, DME etc) are used, CNS will review these.